SlideShare une entreprise Scribd logo
1  sur  45
Télécharger pour lire hors ligne
1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Tomorrow Starts Here
Security Everywhere
Mandar Rege, Security Principal
Cisco Security Solutions
Tomorrow Starts Here
Mandar Rege, Principal
Cisco Security Solutions
Security Everywhere
3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Agenda
H O W ?
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security video
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Are Canadian Businesses Prepared for Future
Security Threats?
60%
of Canadian businesses don’t have
Security strategies in place—or are
unsure how to prepare their networks for
evolving mobile and cloud-based models
Source: Cisco and IDC Canada Survey, Dec. 2014
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Are Canadian Businesses Prepared for Future
Security Threats?
60%
Less than 60% of Canadian businesses have
IT solutions in place to protect company data
on employee-owned devices.
Source: Cisco and IDC Canada Survey, Dec. 2014
31%
of Canada’s largest companies are unsure if
their IT security strategy accounts for evolving
data center and IT consumption models.
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Market Trends
Massive Increase in Connected Devices
Process ThingsPeople Data
+ + +
Rise of Cloud Computing
Changing Business
Models, Architectures
& Service Delivery
The World Has Gone Mobile
Mobile
Traffic
Growth
2013-2019
10X
Ubiquitous Access to Apps
180 billion apps
will download in
2015
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IoT Challenges
Data
Capture, store, and analyze data
Things
Connect to capture useful data
Process
Business and operational benefits
People
Enable workers
1230 RespondentsSource: Cisco Consulting Services Global IoT Study, 2014
20%
27%
13%
40%
Which Areas Does Your Organization Need to Improve to Capitalize on IoT?
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BusinessandSocietalImpact
Intelligent Connections
§  Email
§  Web Browser
§  Search
Connectivity
Digitize Access to
Information
§  Social
§  Mobility
§  Cloud
§  Video
Immersive
Experiences
Digitize Interactions
(Business
and Social)
§  E-commerce
§  Digital Supply Chain
§  Collaboration
Networked
Economy
Digitize Business
Process
Connecting
§  People
§  Process
§  Data
§  Things
Internet of
Everything
Digitize
the World
Evolution of the Internet
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1B1M1K
10B
50BCONNECTED THINGS
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet of Things
…and Everything
Every company becomes a technology company…
Every company becomes a security company
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cyber Security is a Boardroom Discussion
Security breaches are costly
Cisco Confidential 12©2014 Cisco and/or its affiliates. All rights reserved.
Security is the #1 issue for your customers
Protect now the value you intend to create tomorrow
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Security Problem
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Changing
Business Models
Dynamic
Threat Landscape
Complexity and
Fragmentation
Security Challenges
Increasing Connectivity Drives New Business Models
90%
of organizations are not
fully aware of all
network devices
5-10
times more cloud services
are being used than
known by IT
92%
of top Android apps carry
security/privacy/risk
14%
of organizations had
malware enter the
corporate network through
social media/web apps
BYOD Social Media Cloud App Stores
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
60%
Changing
Business Models
Dynamic
Threat Landscape
Complexity and
Fragmentation
Security Challenges
Threats Hide in Plain Sight and Attack Swiftly
of data is
stolen in
of point-of-sale
intrusions aren’t
discovered
for
27	
  
of breaches remain
undiscovered for
increase of
companies reporting
a $10M loss or
more in the last
2015	
  
51%54%85%
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Challenges
Security Silos Complicate Protection
Security Vendors
at RSA
Demand for
Security Talent
Complexity TalentFragmentation
45
Security Vendors for
Some Customers
480 12x
Changing
Business Models
Dynamic
Threat Landscape
Complexity and
Fragmentation
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Growth in Security
Source: Gartner
Total Security
Market
Security
Product Market
Security
Services Market
$95B
CAGR 8.4%
2015-2018
$32B
CAGR 6.4%
2015-2018
$63B
CAGR 9.6%
2015-2018
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Security Hypothesis
Advisory Integration ManagedThreat-centric Platform-basedVisibility-driven
Operational Focus Talent Shortage
+
Security Challenges
+
Requires Improved Outcomes
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Intelligence
10I000 0II0 00 0III000 II1010011 101 1100001 110 101000 0II0 00 0III000 III0I00II II
II0000I II0110000III000III0 I00I II0I III0011 0110011 101000 0110 00 1100001110001III0 I00I II0I III00II 0II00II
101000 0110 00
I00I III0I III00II 0II00II I0I000 0110 00 1100001 110 1100001110001III0 101000 0110 00Threat
Intelligence
Research
Response
Collective
Security Intelligence
21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Threat Intelligence
Unprecedented Breadth & Depth
100TB1.6M13B120,000Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesDaily Malware
Sandbox Reports
100TB
Security
Intelligence
1.6M
Deployed
Devices
13B
Web
Requests
150,000
Micro-
applications
1,000
Applications
93B
Daily Email
Messages
35%
Enterprise
Email
5,500
IPS
Signatures
150M
Deployed
Endpoints
3-5
min
Updates
5B
Daily Email
Connections
4.5B
Daily Email
Blocks
14M
Deployed
Access
Gateway
75,000
FireAMP
Updates
6,000
New Clam
AV Sigs
120K
Sandbox
Reports
Cisco Security Intelligence
Global Visibility
Global Footprint
22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Market Leadership
23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Product Portfolio
Email
Policy & Access
Web
NGF
W
/NGIPS Advanced
Threat
24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Service Portfolio
Assessments
Architecture & Design
Program Strategy
Managed SecurityProduct Support Hosted Security
Optimization
Migration
Integration
Adviso
ry
Managed
Int
egration
25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Continued Security Technology Innovation
Inorganic Growth
2007 2009
2012
2013
2014
20152011
Messaging & Web Security Appliance
XML Firewall Cloud Security Advanced Malware Protection (AMP)
UTM Threat-Centric Security (NGIPS & AMP)
Security ConsulingSecurity Analytics
Dynamic Malware Analysis
26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Neohapsis Acquisition
Industry leading expertise
focused on compliance,
cloud, mobile, and
application security
World class security
consultants with an
average of 15+ years
experience
Emerging threat
research and analysis to
support advanced threat
protection
Advisory
Expertise
Top
Talent
Advanced
Research
27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
H O W ?
28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Gaining Visibility Video
29© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
§  Near real-time analytics
§  Anomaly detection
§  Zero day threat focus
§  Identification to
suppression mean time
reduction
§  Integration of the latest
security technology
§  Extensible platform
designed to evolve with
market demands
§  Improved technology
leverage and
accountability
§  Access to actionable
sources of intelligence
§  Cisco proprietary
telemetry
§  Adapted for customer
intelligence
§  Publicly available
intelligence
§  Operationalization
§  Advanced expertise
§  Combat security talent
shortage
§  Force multiply internal
resources
Managed Threat Defense (MTD)
Organic Innovation
Analytics People Intelligence Technology
CISCO
MTD
30© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Operations Centers
Americas
Austin
Raleigh
EMEAR
Dubai
Krakow
APJC
Sydney
Top Talent
Targeted Expertise
Custom Operations
31© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Managed Threat Defense Architecture
DEDICATED
CUSTOMER SEGMENT
Administrative
Consoles
PORTAL
TICKETING
COMMON SERVICES
Threat Intelligence
Dedicated Customer Portal
Alerting/Ticketing System
Investigator
Portal
Authentication
Services
24/7
ACCESS
CUSTOMER
SOC
Secure Connection
(HTTPS/SSH/IPSec)
VPN
INTERNET
VPN
FIREWALL
FIREWALL
CMSP
Advanced
Malware
Protection
Full Packet
Capture
Anomaly
Detection
Sourcefire
IDS
Collective
Security
Intelligence
Streaming
Analytics
ThreatGrid
NetFlow
Full Packet
Machine
Exhaust
Cisco
Third Party
32© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
DMZUsers
Endpoint Agents
NetFlow Generator
Access Control
Data Center
NetFlow Generator
Access Control
Web Proxy
Email Proxy
Endpoint Agent
NetFlow Generator
Access Control
Talos
MTD: A Comprehensive Threat Solution
Perimeter Firewall
Cisco Cloud Security Internet
Mobile Endpoints
Anywhere / Anytime
MTD
ThreatGRIDSourcefire
Full Packet Anomalies
Endpoint Agent
Application Security
33© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
MTD’s High Fidelity Approach
Post-investigation tickets71
269,808 Security Events
Unique events113,713
High fidelity events1710
207,99261,816Threat intel sourced
Telemetry
generated
34© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Strong Differentiation
Advanced Analytics
and Correlation
Continuous and
Zero-Day Detection
AMP
Everywhere
Reduced Cost
and Complexity
Threat-Focused
Next-Generation Firewall
ASA with
FirePOWER
Integrated Threat Defense
Diverse Threat Intelligence
Real Time Analytics
Managed Threat
Defense
Advanced Expertise
35© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat
Intelligence
Feeds
Enrichment
Data
OpenSOC Overview
Full packet capture
Protocol metadata
NetFlow
Machine exhaust (logs)
Unstructured telemetry
Other streaming telemetry
Parse +
Format
Enrich Alert
Log Mining and
Analytics
Big Data
Exploration,
Predictive
Modelling
Network
Packet Mining
and PCAP
Reconstruction
Applications + Analyst Tools
36© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
OpenSOC Framework
Sources Data Collection Messaging Broker Real-Time Processing Storage Access
Analytic Tools
Tableau
R / Python
Power Pivot
Web Services
Search
PCAP
Reconstruction
Telemetry Sources
NetFlow
Machine Exhaust
HTTP
Other
Flume
Agent B
Agent N
Agent A
Kafka
B Topic
N Topic
PCAP Topic
DPI Topic
A Topic
Storm
B Topology
N Topology
A Topology
PCAP Topology
DPI Topology
Hive
Raw Data
ORC
Elasticsearch
Index
HBase
Packet Table
PCAP
Passive
Tap
Traffic
Replicator
37© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NEW - Incident Management Services
Execution Across the Entire Threat Kill Chain
Know your
threats
Detect threat
activity
Engage kill
chain
Contain and
remove threat
Threat Intelligence, Advisory and
Managed Security Services
Managed Threat
Defense
Incident Response
Services
Advisory Services
Enable growth
Reduce costs
Mitigate Risk
Managed Services
Enhanced visibility
Advanced analytics
38© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Incident Response Services
Experts Combine Latest Intelligence and Best Practices
Security
Experts
Threat
Intelligence
Readiness
•  Infrastructure Breach Preparedness
•  Security Operations Readiness
•  Breach Communications
•  DDOS preparedness
•  Incident Response Training
•  Tabletop Exercises
Response
•  Log Source Assessment, Analysis & Data Mining
•  Forensic Image Analysis
•  Infected System Dynamic Instrumentation
•  Malware Reverse Engineering
•  Exploit Analysis and Re-Implementation
•  Post-breach Remediation
Prepare, assess infrastructure,
operations, communications and skill
Identification, isolation, and remediation
expedience
39© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A S EC S UT D I E S
40© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NEOHAPSIS
Third Party
Risk
§  Multiple vendor assessment
programs
§  Ineffective prioritization and
remediation for vendor risks
§  Bandwidth challenges had
limited the number of
assessments
Challenge
§  Piloted vendor assessment
program including program
management and 25
assessments
§  Delivered improvements to
program processes,
assessment, executive
metrics, and management
oversight
Solution
§  Continuous improvement in
program and assessment
efficacy
§  Greater management
transparency to vendor risks
§  Annual assessments and
summary analysis across all
programs
Outcomes
41© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ADVISORY
Custom Threat
Intelligence
§  Desire to identify “unknown
unknowns”
§  Limited capability for
compromise detection
§  Lack of expertise and tools
for incident management
Challenge
§  Combination of external and
internal instrumentation
§  Detailed traffic monitoring
and forensic analysis
§  Tailored risk impact
assessment and targeted
operational remediation
Solution
§  500+ previously missed
indicators of compromise
(IOCs) within first 90 days
§  65% savings with targeted
security remediation
§  Positive BoD feedback on
improved compliance posture
Outcomes
42© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
INTEGRATION
Identity Services
Engine
§  Limited control over user
access to the network
§  Shortage of internal security
experts for design and build
§  Inability to effectively operate
security policy and controls
Challenge
§  Audit of devices and security
policy configuration
§  ISE implementation and
knowledge transfer
§  24/7 threat monitoring via
Remote Managed Services
Solution
§  100% visibility and control for
BYOD across the network
§  Zero downtime for the
deployment of ISE
§  56% cost reduction through
managed solution
Outcomes
43© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
MANAGED
Managed Threat
Defense (MTD)
§  Uneven visibility into multiple
threat vectors
§  Shortage of operational
security expertise
§  Limited real-time security
analytics capabilities
§  Need for better threat
intelligence
Challenge
§  Predictive analysis and
behavior-based tools
§  24/7 real-time expert staffed
SOCs
§  Incident prioritization
and event correlation
§  Industry leading hybrid
intelligence
Solution
§  34% savings on information
security management through
leverage of MTD SOC
§  95% decrease in redundant
investigations due to higher
fidelity detection
§  70+ high priority threats
remediated per day
Outcomes
44© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Only Cisco Delivers
Physical, Virtual or Cloud
models to fit multiscreen,
IoE and other changing
business needs
Adaptable Business
Models
Unmatched Visibility &
End to End Security
across Cloud, Network and
Customer Premise
Advanced Threat
Protection
Complexity
Reduction
Consistent Policies &
Control Across Devices,
Network, and Data Center
Tomorrow Starts Here - Security Everywhere

Contenu connexe

Tendances

Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Priyanka Aash
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingShah Sheikh
 

Tendances (20)

Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 

Similaire à Tomorrow Starts Here - Security Everywhere

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Digital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesDigital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesMuleSoft
 
Digital Supply Chains & the Internet of Things
Digital Supply Chains & the Internet of ThingsDigital Supply Chains & the Internet of Things
Digital Supply Chains & the Internet of ThingsKevin Ross
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testB2BContact
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...B2BContact
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015ldangelo0772
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
NOS Webinar: Reduce Security Risks to Protect Your Network Final
NOS Webinar: Reduce Security Risks to Protect Your Network FinalNOS Webinar: Reduce Security Risks to Protect Your Network Final
NOS Webinar: Reduce Security Risks to Protect Your Network FinalB2BContact
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 

Similaire à Tomorrow Starts Here - Security Everywhere (20)

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Digital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesDigital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected Devices
 
Digital Supply Chains & the Internet of Things
Digital Supply Chains & the Internet of ThingsDigital Supply Chains & the Internet of Things
Digital Supply Chains & the Internet of Things
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture test
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
PPT TEST
PPT TESTPPT TEST
PPT TEST
 
NOS Webinar: Reduce Security Risks to Protect Your Network Final
NOS Webinar: Reduce Security Risks to Protect Your Network FinalNOS Webinar: Reduce Security Risks to Protect Your Network Final
NOS Webinar: Reduce Security Risks to Protect Your Network Final
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 

Plus de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Tomorrow Starts Here - Security Everywhere

  • 1. 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Tomorrow Starts Here Security Everywhere Mandar Rege, Security Principal Cisco Security Solutions
  • 2. Tomorrow Starts Here Mandar Rege, Principal Cisco Security Solutions Security Everywhere
  • 3. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Agenda H O W ?
  • 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security video
  • 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Are Canadian Businesses Prepared for Future Security Threats? 60% of Canadian businesses don’t have Security strategies in place—or are unsure how to prepare their networks for evolving mobile and cloud-based models Source: Cisco and IDC Canada Survey, Dec. 2014
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Are Canadian Businesses Prepared for Future Security Threats? 60% Less than 60% of Canadian businesses have IT solutions in place to protect company data on employee-owned devices. Source: Cisco and IDC Canada Survey, Dec. 2014 31% of Canada’s largest companies are unsure if their IT security strategy accounts for evolving data center and IT consumption models.
  • 7. 7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Market Trends Massive Increase in Connected Devices Process ThingsPeople Data + + + Rise of Cloud Computing Changing Business Models, Architectures & Service Delivery The World Has Gone Mobile Mobile Traffic Growth 2013-2019 10X Ubiquitous Access to Apps 180 billion apps will download in 2015
  • 8. 8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IoT Challenges Data Capture, store, and analyze data Things Connect to capture useful data Process Business and operational benefits People Enable workers 1230 RespondentsSource: Cisco Consulting Services Global IoT Study, 2014 20% 27% 13% 40% Which Areas Does Your Organization Need to Improve to Capitalize on IoT?
  • 9. 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BusinessandSocietalImpact Intelligent Connections §  Email §  Web Browser §  Search Connectivity Digitize Access to Information §  Social §  Mobility §  Cloud §  Video Immersive Experiences Digitize Interactions (Business and Social) §  E-commerce §  Digital Supply Chain §  Collaboration Networked Economy Digitize Business Process Connecting §  People §  Process §  Data §  Things Internet of Everything Digitize the World Evolution of the Internet
  • 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1B1M1K 10B 50BCONNECTED THINGS
  • 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet of Things …and Everything Every company becomes a technology company… Every company becomes a security company
  • 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cyber Security is a Boardroom Discussion Security breaches are costly Cisco Confidential 12©2014 Cisco and/or its affiliates. All rights reserved. Security is the #1 issue for your customers Protect now the value you intend to create tomorrow
  • 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Security Problem Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation
  • 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation Security Challenges Increasing Connectivity Drives New Business Models 90% of organizations are not fully aware of all network devices 5-10 times more cloud services are being used than known by IT 92% of top Android apps carry security/privacy/risk 14% of organizations had malware enter the corporate network through social media/web apps BYOD Social Media Cloud App Stores
  • 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60% Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation Security Challenges Threats Hide in Plain Sight and Attack Swiftly of data is stolen in of point-of-sale intrusions aren’t discovered for 27   of breaches remain undiscovered for increase of companies reporting a $10M loss or more in the last 2015   51%54%85%
  • 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Challenges Security Silos Complicate Protection Security Vendors at RSA Demand for Security Talent Complexity TalentFragmentation 45 Security Vendors for Some Customers 480 12x Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation
  • 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Growth in Security Source: Gartner Total Security Market Security Product Market Security Services Market $95B CAGR 8.4% 2015-2018 $32B CAGR 6.4% 2015-2018 $63B CAGR 9.6% 2015-2018
  • 18. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 19. 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Security Hypothesis Advisory Integration ManagedThreat-centric Platform-basedVisibility-driven Operational Focus Talent Shortage + Security Challenges + Requires Improved Outcomes
  • 20. 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Intelligence 10I000 0II0 00 0III000 II1010011 101 1100001 110 101000 0II0 00 0III000 III0I00II II II0000I II0110000III000III0 I00I II0I III0011 0110011 101000 0110 00 1100001110001III0 I00I II0I III00II 0II00II 101000 0110 00 I00I III0I III00II 0II00II I0I000 0110 00 1100001 110 1100001110001III0 101000 0110 00Threat Intelligence Research Response Collective Security Intelligence
  • 21. 21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Threat Intelligence Unprecedented Breadth & Depth 100TB1.6M13B120,000Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesDaily Malware Sandbox Reports 100TB Security Intelligence 1.6M Deployed Devices 13B Web Requests 150,000 Micro- applications 1,000 Applications 93B Daily Email Messages 35% Enterprise Email 5,500 IPS Signatures 150M Deployed Endpoints 3-5 min Updates 5B Daily Email Connections 4.5B Daily Email Blocks 14M Deployed Access Gateway 75,000 FireAMP Updates 6,000 New Clam AV Sigs 120K Sandbox Reports Cisco Security Intelligence Global Visibility Global Footprint
  • 22. 22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Market Leadership
  • 23. 23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Product Portfolio Email Policy & Access Web NGF W /NGIPS Advanced Threat
  • 24. 24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Service Portfolio Assessments Architecture & Design Program Strategy Managed SecurityProduct Support Hosted Security Optimization Migration Integration Adviso ry Managed Int egration
  • 25. 25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Continued Security Technology Innovation Inorganic Growth 2007 2009 2012 2013 2014 20152011 Messaging & Web Security Appliance XML Firewall Cloud Security Advanced Malware Protection (AMP) UTM Threat-Centric Security (NGIPS & AMP) Security ConsulingSecurity Analytics Dynamic Malware Analysis
  • 26. 26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Neohapsis Acquisition Industry leading expertise focused on compliance, cloud, mobile, and application security World class security consultants with an average of 15+ years experience Emerging threat research and analysis to support advanced threat protection Advisory Expertise Top Talent Advanced Research
  • 27. 27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential H O W ?
  • 28. 28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Gaining Visibility Video
  • 29. 29© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential §  Near real-time analytics §  Anomaly detection §  Zero day threat focus §  Identification to suppression mean time reduction §  Integration of the latest security technology §  Extensible platform designed to evolve with market demands §  Improved technology leverage and accountability §  Access to actionable sources of intelligence §  Cisco proprietary telemetry §  Adapted for customer intelligence §  Publicly available intelligence §  Operationalization §  Advanced expertise §  Combat security talent shortage §  Force multiply internal resources Managed Threat Defense (MTD) Organic Innovation Analytics People Intelligence Technology CISCO MTD
  • 30. 30© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Operations Centers Americas Austin Raleigh EMEAR Dubai Krakow APJC Sydney Top Talent Targeted Expertise Custom Operations
  • 31. 31© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Managed Threat Defense Architecture DEDICATED CUSTOMER SEGMENT Administrative Consoles PORTAL TICKETING COMMON SERVICES Threat Intelligence Dedicated Customer Portal Alerting/Ticketing System Investigator Portal Authentication Services 24/7 ACCESS CUSTOMER SOC Secure Connection (HTTPS/SSH/IPSec) VPN INTERNET VPN FIREWALL FIREWALL CMSP Advanced Malware Protection Full Packet Capture Anomaly Detection Sourcefire IDS Collective Security Intelligence Streaming Analytics ThreatGrid NetFlow Full Packet Machine Exhaust Cisco Third Party
  • 32. 32© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential DMZUsers Endpoint Agents NetFlow Generator Access Control Data Center NetFlow Generator Access Control Web Proxy Email Proxy Endpoint Agent NetFlow Generator Access Control Talos MTD: A Comprehensive Threat Solution Perimeter Firewall Cisco Cloud Security Internet Mobile Endpoints Anywhere / Anytime MTD ThreatGRIDSourcefire Full Packet Anomalies Endpoint Agent Application Security
  • 33. 33© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential MTD’s High Fidelity Approach Post-investigation tickets71 269,808 Security Events Unique events113,713 High fidelity events1710 207,99261,816Threat intel sourced Telemetry generated
  • 34. 34© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Strong Differentiation Advanced Analytics and Correlation Continuous and Zero-Day Detection AMP Everywhere Reduced Cost and Complexity Threat-Focused Next-Generation Firewall ASA with FirePOWER Integrated Threat Defense Diverse Threat Intelligence Real Time Analytics Managed Threat Defense Advanced Expertise
  • 35. 35© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Intelligence Feeds Enrichment Data OpenSOC Overview Full packet capture Protocol metadata NetFlow Machine exhaust (logs) Unstructured telemetry Other streaming telemetry Parse + Format Enrich Alert Log Mining and Analytics Big Data Exploration, Predictive Modelling Network Packet Mining and PCAP Reconstruction Applications + Analyst Tools
  • 36. 36© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential OpenSOC Framework Sources Data Collection Messaging Broker Real-Time Processing Storage Access Analytic Tools Tableau R / Python Power Pivot Web Services Search PCAP Reconstruction Telemetry Sources NetFlow Machine Exhaust HTTP Other Flume Agent B Agent N Agent A Kafka B Topic N Topic PCAP Topic DPI Topic A Topic Storm B Topology N Topology A Topology PCAP Topology DPI Topology Hive Raw Data ORC Elasticsearch Index HBase Packet Table PCAP Passive Tap Traffic Replicator
  • 37. 37© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NEW - Incident Management Services Execution Across the Entire Threat Kill Chain Know your threats Detect threat activity Engage kill chain Contain and remove threat Threat Intelligence, Advisory and Managed Security Services Managed Threat Defense Incident Response Services Advisory Services Enable growth Reduce costs Mitigate Risk Managed Services Enhanced visibility Advanced analytics
  • 38. 38© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Incident Response Services Experts Combine Latest Intelligence and Best Practices Security Experts Threat Intelligence Readiness •  Infrastructure Breach Preparedness •  Security Operations Readiness •  Breach Communications •  DDOS preparedness •  Incident Response Training •  Tabletop Exercises Response •  Log Source Assessment, Analysis & Data Mining •  Forensic Image Analysis •  Infected System Dynamic Instrumentation •  Malware Reverse Engineering •  Exploit Analysis and Re-Implementation •  Post-breach Remediation Prepare, assess infrastructure, operations, communications and skill Identification, isolation, and remediation expedience
  • 39. 39© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A S EC S UT D I E S
  • 40. 40© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NEOHAPSIS Third Party Risk §  Multiple vendor assessment programs §  Ineffective prioritization and remediation for vendor risks §  Bandwidth challenges had limited the number of assessments Challenge §  Piloted vendor assessment program including program management and 25 assessments §  Delivered improvements to program processes, assessment, executive metrics, and management oversight Solution §  Continuous improvement in program and assessment efficacy §  Greater management transparency to vendor risks §  Annual assessments and summary analysis across all programs Outcomes
  • 41. 41© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ADVISORY Custom Threat Intelligence §  Desire to identify “unknown unknowns” §  Limited capability for compromise detection §  Lack of expertise and tools for incident management Challenge §  Combination of external and internal instrumentation §  Detailed traffic monitoring and forensic analysis §  Tailored risk impact assessment and targeted operational remediation Solution §  500+ previously missed indicators of compromise (IOCs) within first 90 days §  65% savings with targeted security remediation §  Positive BoD feedback on improved compliance posture Outcomes
  • 42. 42© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential INTEGRATION Identity Services Engine §  Limited control over user access to the network §  Shortage of internal security experts for design and build §  Inability to effectively operate security policy and controls Challenge §  Audit of devices and security policy configuration §  ISE implementation and knowledge transfer §  24/7 threat monitoring via Remote Managed Services Solution §  100% visibility and control for BYOD across the network §  Zero downtime for the deployment of ISE §  56% cost reduction through managed solution Outcomes
  • 43. 43© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential MANAGED Managed Threat Defense (MTD) §  Uneven visibility into multiple threat vectors §  Shortage of operational security expertise §  Limited real-time security analytics capabilities §  Need for better threat intelligence Challenge §  Predictive analysis and behavior-based tools §  24/7 real-time expert staffed SOCs §  Incident prioritization and event correlation §  Industry leading hybrid intelligence Solution §  34% savings on information security management through leverage of MTD SOC §  95% decrease in redundant investigations due to higher fidelity detection §  70+ high priority threats remediated per day Outcomes
  • 44. 44© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Only Cisco Delivers Physical, Virtual or Cloud models to fit multiscreen, IoE and other changing business needs Adaptable Business Models Unmatched Visibility & End to End Security across Cloud, Network and Customer Premise Advanced Threat Protection Complexity Reduction Consistent Policies & Control Across Devices, Network, and Data Center